
Felipe Ruiz
10 recent critical security breaches
The transportation and logistics sector is now among the most attacked worldwide. Discover some of the most significant recent cyber attacks.

Felipe Ruiz
Towards enhanced vulnerability prioritization
In this blog post, you will learn about reachability analysis, a software assessment technique that helps to prioritize vulnerabilities for their remediation.

Juan Díaz
How we enhance our tests by standardizing them
At Fluid Attacks, we built an internal testing framework to improve our tests in Python. Let's talk about our motivation and results.

Felipe Ruiz
Introduction to cybersecurity in the aviation sector
As part of the transportation industry, the aviation sector, in its massive digital transformation, has faced cybersecurity challenges worth highlighting.

Jason Chavarría
Why measure cybersecurity risk with our CVSSF metric?
We present some of the flaws of the traditional measure of cybersecurity risk and introduce CVSSF, the risk-exposure-based metric with which we overcome them.

Daniel Salazar
Our new testing architecture for software development
Learn about how we test our platform, the pain points we faced in the past, and a new architecture that improves our testing quality and development experience.

Felipe Ruiz
Protecting your PoS systems from cyber threats
PoS devices are now part and parcel of the retail industry. In this post, we explain the risks these systems face and the best practices for protecting them.

Felipe Ruiz
Top seven successful cyberattacks against this industry
Cyberattacks that negatively impact some companies can serve as a warning and a lesson for others, at least for those still behind the curve in cybersecurity.

Felipe Ruiz
Challenges, threats, and best practices for retailers
The retail sector is part of the global digital transformation, so it is constantly exposed to security threats, for which it should have a preventive posture.